Skip to main content

Security of IoT Application Layer: Requirements, Threats, and Solutions

  • Conference paper
  • First Online:
Ambient Intelligence—Software and Applications—13th International Symposium on Ambient Intelligence (ISAmI 2022)

Abstract

Nowadays, communication systems and networks, become an integral part of not only our everyday life but also even in industry, critical infrastructure, business, etc. Current trends and paradigms, such as Internet of Things (IoT), promise improved quality of life, better business opportunities, cost-effective production, and careful operation management via ubiquitous connectivity and effective deployment of smart physical objects. IoT networks capture, gather, process, and transmit a huge amount of security- and privacy-critical data, then becomes them an available option for intruders. Given the fact that IoT networks deal with the fundamental aspects of human lives and critical infrastructures, cybersecurity in such networks is crucially important. The unique characteristics, large scale, and complexity of these networks bring about further vulnerabilities. The goal of this paper is to shed light on the security requirements of the IoT application layer, its threats, and potential countermeasures.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 149.00
Price excludes VAT (USA)
  • Available as EPUB and PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD 199.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

References

  1. Atzori, L., Iera, A., Morabito, G.: The internet of things: a survey. Comput. Netw. 54(15), 2787–2805 (2010)

    Article  MATH  Google Scholar 

  2. Gupta, S., Ranga, V., Agrawal, P.: Epilnet: a novel approach to IoT based epileptic seizure prediction and diagnosis system using artificial intelligence. arXiv preprint arXiv:2111.03265 (2021)

  3. de Alba, F.L., González-Briones, A., Chamoso, P., Pinto, T., Vale, Z., Corchado, J.M.: A P2P electricity negotiation agent systems in urban smart grids. In: International Symposium on Distributed Computing and Artificial Intelligence, pp. 97–106. Springer, Berlin (2020)

    Google Scholar 

  4. Unzueta, M., Bartolomé, A., Hernández, G., Parra, J., Chamoso, P.: System for recommending financial products adapted to the user’s profile. In: International Symposium on Ambient Intelligence, pp. 117–126. Springer, Berlin (2020)

    Google Scholar 

  5. Cisco, U.: Cisco Annual Internet Report (2018–2023) White Paper. Cisco, San Jose, CA, USA (2020)

    Google Scholar 

  6. Ali, I., Hussain, T., Khan, K., Iqbal, A., Perviz, F.: The impact of IEEE 802.11 contention window on the performance of transmission control protocol in mobile ad-hoc network. ADCAIJ: Adv. Distrib. Comput. Artif. Intell. J. 9(3), 29–48 (2020)

    Google Scholar 

  7. Chamoso, P., González-Briones, A., De La Prieta, F., Venyagamoorthy, G.K., Corchado, J.M.: Smart city as a distributed platform: toward a system for citizen-oriented management. Comput. Commun. 152, 323–332 (2020)

    Article  Google Scholar 

  8. González-Briones, A., Castellanos-Garzón, J.A., Mezquita Martín, Y., Prieto, J., Corchado, J.M.: A framework for knowledge discovery from wireless sensor networks in rural environments: a crop irrigation systems case study. Wirel. Commun. Mob. Comput. 2018 (2018)

    Google Scholar 

  9. Abrishambaf, O., Faria, P., Gomes, L., Spínola, J., Vale, Z., Corchado, J.M.: Implementation of a real-time microgrid simulation platform based on centralized and distributed management. Energies 10(6), 806 (2017)

    Article  Google Scholar 

  10. Gonçalves, C., Rebelo, D., Silva, F., Analide, C.: Sleep performance and physical activity estimation from multisensor time series sleep environment data. In: International Symposium on Ambient Intelligence, pp. 166–176. Springer, Berlin (2020)

    Google Scholar 

  11. Casado-Vara, R., Martin-del Rey, A., Affes, S., Prieto, J., Corchado, J.M.: IoT network slicing on virtual layers of homogeneous data for improved algorithm operation in smart buildings. Future Gener. Comput. Syst. 102, 965–977 (2020)

    Article  Google Scholar 

  12. Da Xu, L., Lu, Y., Li, L.: Embedding blockchain technology into IoT for security: a survey. IEEE Internet Things J. 8(13), 10452–10473 (2021)

    Article  Google Scholar 

  13. Raufa, A., Abdullaha, A.H., Mateenb, A., Ashrafb, M.: Secure data access control with perception reasoning. ADCAIJ: Adv. Distrib. Comput. Artif. Intell. J. 13 (2018)

    Google Scholar 

  14. Swessi, D., Idoudi, H.: A survey on internet-of-things security: threats and emerging countermeasures. Wirel. Pers. Commun. 1–36 (2022)

    Google Scholar 

  15. Shahraki, A., Abbasi, M., Haugen, Ø.: Boosting algorithms for network intrusion detection: a comparative evaluation of real adaboost, gentle adaboost and modest adaboost. Eng. Appl. Artif. Intell. 94, 103770 (2020)

    Article  Google Scholar 

  16. Zhang, Z.-K., Cho, M.C.Y., Wang, C.-W., Hsu, C.-W., Chen, C.-K., Shieh, S.: IoT security: ongoing challenges and research opportunities. In: 2014 IEEE 7th International Conference on Service-Oriented Computing and Applications, pp. 230–234. IEEE (2014)

    Google Scholar 

  17. Sobin, C.: A survey on architecture, protocols and challenges in IoT. Wirel. Pers. Commun. 112(3), 1383–1429 (2020)

    Article  Google Scholar 

  18. Hernández, G., Rodríguez, S., González, A., Corchado, J.M., Prieto, J.: Video analysis system using deep learning algorithms. In: International Symposium on Ambient Intelligence, pp. 186–199. Springer, Berlin (2020)

    Google Scholar 

  19. Nauman, A., Qadri, Y.A., Amjad, M., Zikria, Y.B., Afzal, M.K., Kim, S.W.: Multimedia internet of things: a comprehensive survey. IEEE Access 8, 8202–8250 (2020)

    Article  Google Scholar 

  20. Fatras, N., Ma, Z., Jørgensen, B.N.: System architecture modelling framework applied to the integration of electric vehicles in the grid. In: International Symposium on Distributed Computing and Artificial Intelligence, pp. 205–209. Springer, Berlin (2020)

    Google Scholar 

  21. Sakarkar, G., Kolekar, M.K.H., Paithankar, K., Gaurav, G.P., Dutta, P., Chaturvedi, R., Kumar, S., et al.: Advance approach for detection of DNS tunneling attack from network packets using deep learning algorithms (2021)

    Google Scholar 

  22. Plaza-Hernandez, M., Sittón-Candanedo, I., Alonso, R.S., Martínez-de Iturrate, L.C., Prieto, J., Kravari, K., Kosmanis, T., Katranas, G., Silva, M.P., Corchado, J.M.: Edge computing and internet of things based platform to improve the quality of life of the silver economy on leisure cruise ships. In: 2021 International Symposium on Computer Science and Intelligent Controls (ISCSIC), pp. 159–163. IEEE (2021)

    Google Scholar 

  23. Salazar, G., Figueiredo, L., Ferreira, N.: Towards the development of IoT protocols. In: International Symposium on Ambient Intelligence, pp. 146–155. Springer, Berlin (2020)

    Google Scholar 

  24. Zahoor, S., Mir, R.N.: Resource management in pervasive internet of things: a survey. J. King Saud Univ.-Comput. Inf. Sci. 33(8), 921–935 (2021)

    Google Scholar 

  25. Omolara, A.E., Alabdulatif, A., Abiodun, O.I., Alawida, M., Alabdulatif, A., Arshad, H., et al.: The internet of things security: a survey encompassing unexplored areas and new insights. Comput. Secur. 112, 102494 (2022)

    Article  Google Scholar 

  26. Alonso, R.S.: Low-power distributed AI and IoT for measuring lamb’s milk ingestion and predicting meat yield and malnutrition diseases. In: International Symposium on Ambient Intelligence, pp. 251–257. Springer, Berlin (2020)

    Google Scholar 

  27. Gunduz, M.Z., Das, R.: Cyber-security on smart grid: threats and potential solutions. Comput. Netw. 169, 107094 (2020)

    Article  Google Scholar 

  28. Gough, M.B., Santos, S.F., AlSkaif, T., Javadi, M.S., Castro, R., Catalão, J.P.: Preserving privacy of smart meter data in a smart grid environment. IEEE Trans. Ind. Inform. 18(1), 707–718 (2021)

    Article  Google Scholar 

  29. Alshehri, F., Muhammad, G.: A comprehensive survey of the internet of things (IoT) and AI-based smart healthcare. IEEE Access 9, 3660–3678 (2020)

    Article  Google Scholar 

  30. Hemalatha, R., et al.: A survey: security challenges of VANET and their current solution. Turk. J. Comput. Math. Educ. (TURCOMAT) 12(2), 1239–1244 (2021)

    Article  Google Scholar 

  31. Ali, I., Chen, Y., Faisal, M., Li, M.: Certificateless signature-based authentication scheme for vehicle-to-infrastructure communications using bilinear pairing. In: Efficient and Provably Secure Schemes for Vehicular Ad-Hoc Networks, pp. 91–119. Springer, Berlin (2022)

    Google Scholar 

  32. Yang, X., Shu, L., Chen, J., Ferrag, M.A., Wu, J., Nurellari, E., Huang, K.: A survey on smart agriculture: development modes, technologies, and security and privacy challenges. IEEE/CAA J. Automatica Sin. 8(2), 273–302 (2021)

    Article  Google Scholar 

  33. Gebremichael, T., Ledwaba, L.P.I., Eldefrawy, M.H., Hancke, G.P., Pereira, N., Gidlund, M., Akerberg, J.: Security and privacy in the industrial internet of things: current standards and future challenges. IEEE Access 8, 152351–152366 (2020)

    Article  Google Scholar 

  34. Agrawal, N., Kumar, R.: Security perspective analysis of industrial cyber physical systems (I-CPS): a decade-wide survey. ISA Trans. (2022)

    Google Scholar 

  35. Dhirani, L.L., Armstrong, E., Newe, T.: Industrial IoT, cyber threats, and standards landscape: evaluation and roadmap. Sensors 21(11) (2021) [Online]. Available: www.mdpi.com/1424-8220/21/11/3901

  36. Al-Turjman, F., Alturjman, S.: Confidential smart-sensing framework in the IoT era. J. Supercomput. 74(10), 5187–5198 (2018). https://doi.org/10.1007/s11227-018-2524-1

    Article  Google Scholar 

  37. Casado-Vara, R., de la Prieta, F., Prieto, J., Corchado, J.M.: Blockchain framework for IoT data quality via edge computing. In: Proceedings of the 1st Workshop on Blockchain-Enabled Networked Sensor Systems, pp. 19–24 (2018)

    Google Scholar 

  38. Machado, C., Fröhlich, A.A.M.: IoT data integrity verification for cyber-physical systems using blockchain. In: 2018 IEEE 21st International Symposium on Real-Time Distributed Computing (ISORC), pp. 83–90. IEEE (2018)

    Google Scholar 

  39. Casado-Vara, R., Novais, P., Gil, A.B., Prieto, J., Corchado, J.M.: Distributed continuous-time fault estimation control for multiple devices in IoT networks. IEEE Access 7, 11972–11984 (2019)

    Article  Google Scholar 

  40. Yan, J., Liu, J., Tseng, F.-M.: An evaluation system based on the self-organizing system framework of smart cities: a case study of smart transportation systems in China. Technol. Forecast. Soc. Change 153, 119371 (2020)

    Article  Google Scholar 

  41. Algarni, A.: A survey and classification of security and privacy research in smart healthcare systems. IEEE Access 7, 101879–101894 (2019)

    Article  Google Scholar 

  42. Salman, T., Jain, R.: A survey of protocols and standards for internet of things. arXiv preprint arXiv:1903.11549 (2019)

  43. Mezquita, Y., Gil-González, A.B., Martín del Rey, A., Prieto, J., Corchado, J.M.: Towards a blockchain-based peer-to-peer energy marketplace. Energies 15(9), 3046 (2022)

    Google Scholar 

  44. Zhang, H., Liu, B., Wu, H.: Smart grid cyber-physical attack and defense: a review. IEEE Access 9, 29641–29659 (2021)

    Article  Google Scholar 

  45. Sengan, S., Subramaniyaswamy, V., Indragandhi, V., Velayutham, P., Ravi, L.: Detection of false data cyber-attacks for the assessment of security in smart grid using deep learning. Comput. Electr. Eng. 93, 107211 (2021)

    Article  Google Scholar 

  46. Zavala-Díaz, J., Reyes-Archundia, E., Olivares-Rojas, J.C., Chávez-Báez, M.V., Gutiérrez-Gnecchi, J.A., Méndez-Patiño, A.: Study of public key cryptography techniques for authentication in embedded devices for smart grids. In: 2021 IEEE International Autumn Meeting on Power, Electronics and Computing (ROPEC), vol. 5, pp. 1–5. IEEE (2021)

    Google Scholar 

  47. Pirayesh, H., Zeng, H.: Jamming attacks and anti-jamming strategies in wireless networks: a comprehensive survey. IEEE Commun. Surv. Tutorials (2022)

    Google Scholar 

  48. Ghayvat, H., Pandya, S.N., Bhattacharya, P., Zuhair, M., Rashid, M., Hakak, S., Dev, K.: CP-BDHCA: blockchain-based confidentiality-privacy preserving big data scheme for healthcare clouds and applications. IEEE J. Biomed. Health Inf. (2021)

    Google Scholar 

  49. Renuka, K., Kumari, S., Li, X.: Design of a secure three-factor authentication scheme for smart healthcare. J. Med. Syst. 43(5), 1–12 (2019)

    Article  Google Scholar 

  50. Xu, C., Yang, H.H., Wang, X., Quek, T.Q.: Optimizing information freshness in computing-enabled IoT networks. IEEE Internet Things J. 7(2), 971–985 (2019)

    Article  Google Scholar 

  51. Maimaris, A., Papageorgiou, G.: A review of intelligent transportation systems from a communications technology perspective. In: 2016 IEEE 19th International Conference on Intelligent Transportation Systems (ITSC), pp. 54–59. IEEE (2016)

    Google Scholar 

  52. Behzadan, V., Munir, A.: Models and framework for adversarial attacks on complex adaptive systems. arXiv preprint arXiv:1709.04137 (2017)

  53. Azam, F., Kumar, S., Yadav, K., Priyadarshi, N., Padmanaban, S.: An outline of the security challenges in VANET. In: 2020 IEEE 7th Uttar Pradesh Section International Conference on Electrical, Electronics and Computer Engineering (UPCON), pp. 1–6. IEEE (2020)

    Google Scholar 

  54. Verma, S.B., Verma, S.B., et al.: Secure data transmission in BPEL (business process execution language) (2020)

    Google Scholar 

  55. Shen, X., Lu, Y., Zhang, Y., Liu, X., Zhang, L.: An innovative data integrity verification scheme in the internet of things assisted information exchange in transportation systems. Cluster Comput. 1–13 (2022)

    Google Scholar 

  56. Gupta, M., Abdelsalam, M., Khorsandroo, S., Mittal, S.: Security and privacy in smart farming: challenges and opportunities. IEEE Access 8, 34564–34584 (2020)

    Article  Google Scholar 

  57. Salamatian, S., Huleihel, W., Beirami, A., Cohen, A., Médard, M.: Why botnets work: distributed brute-force attacks need no synchronization. IEEE Trans. Inf. Forensics Secur. 14(9), 2288–2299 (2019)

    Article  Google Scholar 

  58. Ferrag, M.A., Shu, L., Djallel, H., Choo, K.-K.R.: Deep learning-based intrusion detection for distributed denial of service attack in agriculture 4.0. Electronics 10(11) (2021) [Online]. Available: www.mdpi.com/2079-9292/10/11/1257

  59. Sontowski, S., Gupta, M., Laya Chukkapalli, S.S., Abdelsalam, M., Mittal, S., Joshi, A., Sandhu, R.: Cyber attacks on smart farming infrastructure. In: 2020 IEEE 6th International Conference on Collaboration and Internet Computing (CIC), pp. 135–143 (2020)

    Google Scholar 

  60. Wang, Q., Chen, D., Zhang, N., Qin, Z., Qin, Z.: LACS: a lightweight label-based access control scheme in IoT-based 5g caching context. IEEE Access 5, 4018–4027 (2017)

    Article  Google Scholar 

  61. Li, Q., Zhang, X., Zheng, Q., Sandhu, R., Fu, X.: Live: lightweight integrity verification and content access control for named data networking. IEEE Trans. Inf. Forensics Secur. 10(2), 308–320 (2015)

    Article  Google Scholar 

  62. Gope, P., Amin, R., Hafizul Islam, S., Kumar, N., Bhalla, V.K.: Lightweight and privacy-preserving RFID authentication scheme for distributed IoT infrastructure with secure localization services for smart city environment. Future Gener. Comput. Syst. 83, 629–637 (2018) [Online]. Available: www.sciencedirect.com/science/article/pii/S0167739X17313043

  63. Sánchez, S.M.: Integral support predictive platform for industry 4.0. ADCAIJ: Adv. Distrib. Comput. Artif. Intell. J. 9(4), 71–82 (2020)

    Google Scholar 

  64. Tuptuk, N., Hailes, S.: Security of smart manufacturing systems. J. Manuf. Syst. 47, 93–106 (2018) [Online]. Available: www.sciencedirect.com/science/article/pii/S0278612518300463

  65. Del Rey, Á.M., Batista, F.K., Dios, A. Q.: Malware propagation in wireless sensor networks: global models vs individual-based models. ADCAIJ: Adv. Distrib. Comput. Artif. Intell. J. 6(3), 5–15 (2017)

    Google Scholar 

  66. ElMamy, S.B., Mrabet, H., Gharbi, H., Jemai, A., Trentesaux, D.: A survey on the usage of blockchain technology for cyber-threats in the context of industry 4.0. Sustainability 12(21), 9179 (2020)

    Google Scholar 

  67. Lu, Y., Wang, D., Obaidat, M.S., Vijayakumar, P.: Edge-assisted intelligent device authentication in cyber-physical systems. IEEE Internet Things J. (2022)

    Google Scholar 

  68. Chhetri, S.R., Rashid, N., Faezi, S., Al Faruque, M.A.: Security trends and advances in manufacturing systems in the era of industry 4.0. In: 2017 IEEE/ACM International Conference on Computer-Aided Design (ICCAD), pp. 1039–1046 (2017)

    Google Scholar 

  69. Lupión, M., Redondo, J.L., Sanjuan, J.F., Ortigosa, P.M.: Deployment of an IoT platform for activity recognition at the ual’s smart home. In: International Symposium on Ambient Intelligence, pp. 82–92. Springer, Berlin (2020)

    Google Scholar 

Download references

Acknowledgements

This work has been performed under the IoTalentum project within the framework of Marie Skłodowska-Curie Actions ITN-ETN (grant number 953442) which is funded by the European Union Horizon 2020 research and innovation program.

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Marta Plaza-Hernández .

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2023 The Author(s), under exclusive license to Springer Nature Switzerland AG

About this paper

Check for updates. Verify currency and authenticity via CrossMark

Cite this paper

Abbasi, M., Plaza-Hernández, M., Mezquita, Y. (2023). Security of IoT Application Layer: Requirements, Threats, and Solutions. In: Julián, V., Carneiro, J., Alonso, R.S., Chamoso, P., Novais, P. (eds) Ambient Intelligence—Software and Applications—13th International Symposium on Ambient Intelligence. ISAmI 2022. Lecture Notes in Networks and Systems, vol 603. Springer, Cham. https://doi.org/10.1007/978-3-031-22356-3_9

Download citation

Publish with us

Policies and ethics